From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932144AbeDWRht (ORCPT ); Mon, 23 Apr 2018 13:37:49 -0400 Received: from gateway24.websitewelcome.com ([192.185.51.172]:40908 "EHLO gateway24.websitewelcome.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932093AbeDWRhp (ORCPT ); Mon, 23 Apr 2018 13:37:45 -0400 X-Authority-Reason: nr=8 Date: Mon, 23 Apr 2018 12:37:41 -0500 From: "Gustavo A. R. Silva" To: Mauro Carvalho Chehab , linux-media@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , Dan Carpenter Cc: Laurent Pinchart , linux-renesas-soc@vger.kernel.org, Hans Verkuil , Ramesh Shanmugasundaram , Niklas =?iso-8859-1?Q?S=F6derlund?= , Jonathan Corbet , Kyungmin Park , Sylwester Nawrocki , Kukjin Kim , Krzysztof Kozlowski , linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org Subject: [PATCH 00/11] fix potential Spectre variant 1 issues Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator4166.hostgator.com X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - embeddedor.com X-BWhitelist: no X-Source-IP: 189.145.48.65 X-Source-L: No X-Exim-ID: 1fAfPL-004LHh-Bz X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (embeddedor) [189.145.48.65]:49540 X-Source-Auth: gustavo@embeddedor.com X-Email-Count: 3 X-Source-Cap: Z3V6aWRpbmU7Z3V6aWRpbmU7Z2F0b3I0MTY2Lmhvc3RnYXRvci5jb20= X-Local-Domain: yes Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patchset aims to fix various media platform and media usb cases where we have user controlled array dereferences that could be exploited due to the Spectre variant 1 vulnerability. All were reported by Dan Carpenter. Notice that given that speculation windows are large, the policy is to kill the speculation on the first load and not worry if it can be completed with a dependent load/store [1]. [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2 Thanks Gustavo A. R. Silva (11): media: tm6000: fix potential Spectre variant 1 exynos4-is: mipi-csis: fix potential Spectre variant 1 fsl-viu: fix potential Spectre variant 1 marvell-ccic: mcam-core: fix potential Spectre variant 1 omap_vout: fix potential Spectre variant 1 rcar-v4l2: fix potential Spectre variant 1 rcar_drif: fix potential Spectre variant 1 sh_vou: fix potential Spectre variant 1 vimc-debayer: fix potential Spectre variant 1 vivid-sdr-cap: fix potential Spectre variant 1 vsp1_rwpf: fix potential Spectre variant 1 drivers/media/platform/exynos4-is/mipi-csis.c | 5 ++++- drivers/media/platform/fsl-viu.c | 8 ++++---- drivers/media/platform/marvell-ccic/mcam-core.c | 3 +++ drivers/media/platform/omap/omap_vout.c | 3 +++ drivers/media/platform/rcar-vin/rcar-v4l2.c | 4 +++- drivers/media/platform/rcar_drif.c | 4 +++- drivers/media/platform/sh_vou.c | 3 +++ drivers/media/platform/vimc/vimc-debayer.c | 5 ++++- drivers/media/platform/vivid/vivid-sdr-cap.c | 6 ++++++ drivers/media/platform/vsp1/vsp1_rwpf.c | 3 +++ drivers/media/usb/tm6000/tm6000-video.c | 2 ++ 11 files changed, 38 insertions(+), 8 deletions(-) -- 2.7.4 From mboxrd@z Thu Jan 1 00:00:00 1970 From: gustavo@embeddedor.com (Gustavo A. R. Silva) Date: Mon, 23 Apr 2018 12:37:41 -0500 Subject: [PATCH 00/11] fix potential Spectre variant 1 issues Message-ID: To: linux-arm-kernel@lists.infradead.org List-Id: linux-arm-kernel.lists.infradead.org This patchset aims to fix various media platform and media usb cases where we have user controlled array dereferences that could be exploited due to the Spectre variant 1 vulnerability. All were reported by Dan Carpenter. Notice that given that speculation windows are large, the policy is to kill the speculation on the first load and not worry if it can be completed with a dependent load/store [1]. [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2 Thanks Gustavo A. R. Silva (11): media: tm6000: fix potential Spectre variant 1 exynos4-is: mipi-csis: fix potential Spectre variant 1 fsl-viu: fix potential Spectre variant 1 marvell-ccic: mcam-core: fix potential Spectre variant 1 omap_vout: fix potential Spectre variant 1 rcar-v4l2: fix potential Spectre variant 1 rcar_drif: fix potential Spectre variant 1 sh_vou: fix potential Spectre variant 1 vimc-debayer: fix potential Spectre variant 1 vivid-sdr-cap: fix potential Spectre variant 1 vsp1_rwpf: fix potential Spectre variant 1 drivers/media/platform/exynos4-is/mipi-csis.c | 5 ++++- drivers/media/platform/fsl-viu.c | 8 ++++---- drivers/media/platform/marvell-ccic/mcam-core.c | 3 +++ drivers/media/platform/omap/omap_vout.c | 3 +++ drivers/media/platform/rcar-vin/rcar-v4l2.c | 4 +++- drivers/media/platform/rcar_drif.c | 4 +++- drivers/media/platform/sh_vou.c | 3 +++ drivers/media/platform/vimc/vimc-debayer.c | 5 ++++- drivers/media/platform/vivid/vivid-sdr-cap.c | 6 ++++++ drivers/media/platform/vsp1/vsp1_rwpf.c | 3 +++ drivers/media/usb/tm6000/tm6000-video.c | 2 ++ 11 files changed, 38 insertions(+), 8 deletions(-) -- 2.7.4